Overview
overview
10Static
static
100229b0ed26...57.exe
windows7-x64
100229b0ed26...57.exe
windows10-2004-x64
10048b7d1176...04.exe
windows7-x64
10048b7d1176...04.exe
windows10-2004-x64
100f9f03bf48...ae.exe
windows7-x64
100f9f03bf48...ae.exe
windows10-2004-x64
1013047f8cb7...6b.exe
windows7-x64
113047f8cb7...6b.exe
windows10-2004-x64
113c6577c68...d4.exe
windows7-x64
713c6577c68...d4.exe
windows10-2004-x64
7Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 05:39
Behavioral task
behavioral1
Sample
0229b0ed2674e64d663aadcd2d289315b73b14b43b35101ff4fd69456b7c5557.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0229b0ed2674e64d663aadcd2d289315b73b14b43b35101ff4fd69456b7c5557.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
048b7d11768267d538ae8066805e65a387d52c90ecfd929f695866120e853904.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
048b7d11768267d538ae8066805e65a387d52c90ecfd929f695866120e853904.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
0f9f03bf486e3823a6ad596d4c1bd707fe19031acc0d17a3138409c8f3ee89ae.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
0f9f03bf486e3823a6ad596d4c1bd707fe19031acc0d17a3138409c8f3ee89ae.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
13047f8cb7277ad8c1daa6f32cf4ae8029fb6ae9f839ed92d4cae12285ed366b.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
13047f8cb7277ad8c1daa6f32cf4ae8029fb6ae9f839ed92d4cae12285ed366b.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe
Resource
win10v2004-20230915-en
General
-
Target
13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe
-
Size
347KB
-
MD5
960f9112b687fc805cc7d6483ec60a14
-
SHA1
a4f965d227bdc79f49e09172f27e4e647e065a05
-
SHA256
13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4
-
SHA512
a1b8ef63d87f6a41627258297ab8da91e4d7efafb83220d03ce8046c7142c641f14e118483652a830b44c441af4eba668352860eae51994efff9fed84c13de57
-
SSDEEP
6144:5kO+mGx363FXS+3oYU9IML4ChRJX6Tf1AR+O+v0NaRH:5pcRkFih9IMkC9qxr0NC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1872 4936 WerFault.exe 81 -
Kills process with taskkill 1 IoCs
pid Process 1420 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1420 taskkill.exe Token: SeManageVolumePrivilege 460 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4864 4936 13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe 88 PID 4936 wrote to memory of 4864 4936 13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe 88 PID 4936 wrote to memory of 4864 4936 13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe 88 PID 4864 wrote to memory of 1420 4864 cmd.exe 92 PID 4864 wrote to memory of 1420 4864 cmd.exe 92 PID 4864 wrote to memory of 1420 4864 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe"C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 13602⤵
- Program crash
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4936 -ip 49361⤵PID:4564
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:460